publications
publications in a reversed chronological order
2024
- TVLSIAnother Look at Side-Channel-Resistant Encoding SchemesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2024
- ARESRMF: A Risk Measurement Framework for Machine Learning ModelsIn International Conference on Availability, Reliability and Security (ARES), 2024
- ISVLSISide-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (to appear)In IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2024
2023
- CS
- CaC
- Access
- CSCMLA Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural NetworksIn International Symposium on Cyber Security, Cryptology, and Machine Learning, 2023
2022
- TRSNIFF: reverse engineering of neural networks with fault attacksIEEE Transactions on Reliability, 2022
- TCHESA finer-grain analysis of the leakage (non) resilience of OCBIACR Transactions on Cryptographic Hardware and Embedded Systems, 2022
- TCHESSide channel attack on stream ciphers: A three-step approach to state/key recoveryIACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
- Access
- Book ChapterOn implementation-level security of edge-based machine learning modelsIn Security and Artificial Intelligence: A Crossdisciplinary Approach, 2022
- SPACEBig brother is watching you: a closer look at backdoor constructionIn International Conference on Security, Privacy, and Applied Cryptography Engineering, 2022
- TIFSSBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD SchemesIEEE Transactions on Information Forensics and Security, 2022
2021
- TDSCOn Evaluating Fault Resilient Encoding Schemes in SoftwareIEEE Transactions on Dependable and Secure Computing, 2021
- DATEMachine Learning-Assisted Differential Distinguishers for Lightweight CiphersIn Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021
- TIFSBack to the basics: Seamless integration of side-channel pre-processing in deep neural networksIEEE Transactions on Information Forensics and Security, 2021
- SILCFollowing-up on machine learning assisted differential distinguishersIn SILC Workshop-Security and Implementation of Lightweight Cryptography, 2021
- DATEDNFA: Differential no-fault analysis of bit permutation based ciphers assisted by side-channelIn 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021
- DATEFeeding three birds with one scone: A generic duplication based countermeasure to fault attacksIn 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021
- MRPhysical security of deep learning on edge devices: Comprehensive evaluation of fault injection attack vectorsMicroelectronics Reliability, 2021
- AsiaCryptDEFAULT: Cipher-Level Resistance Against Differential Fault AttackIn Advances in Cryptology – ASIACRYPT 2021, 2021
- SILCMachine learning attacks on SPECKSecurity and Implementation of Lightweight Cryptography (SILC), 2021
2020
- TCAS2A Countermeasure Against Statistical Ineffective Fault AnalysisIEEE Transactions on Circuits and Systems II: Express Briefs, 2020
- TIFSOn side channel vulnerabilities of bit permutations in cryptographic algorithmsIEEE Transactions on Information Forensics and Security, 2020
- TCHESSITM: See-in-the-middle side-channel assisted middle round differential cryptanalysis on SPN block ciphersIACR Transactions on Cryptographic Hardware and Embedded Systems, 2020
- JETCNeural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy ChecksACM Journal on Emerging Technologies in Computing Systems (JETC), 2020
- IPFASecurity evaluation of deep neural network resistance against laser fault injectionIn 2020 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), 2020
-
2019
- Book ChapterDifferential fault attack resistant hardware design automationAutomated Methods in Cryptographic Fault Analysis, 2019
- Book ChapterDifferential Fault Analysis Automation on Assembly CodeAutomated Methods in Cryptographic Fault Analysis, 2019
- Edited BookAutomated Methods in Cryptographic Fault Analysis2019
- AsiaCCSSoK: on DFA vulnerabilities of substitution-permutation networksIn Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
- TCSCADFA: Combined SCA+ DFA attacks on block ciphers with practical validationsIEEE Transactions on Computers, 2019
- TCHESFully Automated Differential Fault Analysis on Software Implementations of Block CiphersIACR Transactions Cryptographic Hardware and Embedded Systems, 2019
2018
- TCHESFault Attacks Made Easy: Differential Fault Analysis Automation on Assembly CodeIACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
- DATESCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphersIn 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018
- DATEDFARPA: Differential fault attack resistant physical design automationIn 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018
- HOSTProtecting block ciphers against differential fault attacks without re-keyingIn 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018
- Book ChapterReactive Design Strategies Against Fault Injection AttacksFault Tolerant Architectures for Cryptography and Hardware Security, 2018
- Book ChapterSide-Channel Assisted Fault AnalysisFault Tolerant Architectures for Cryptography and Hardware Security, 2018
- Book ChapterLaser-based fault injection on microcontrollersFault Tolerant Architectures for Cryptography and Hardware Security, 2018
- ISVLSIPpap and ippap: Pll-based protection against physical attacksIn 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2018
- CCSPractical fault attack on deep neural networksIn Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
- FDTCBreaking redundancy-based countermeasures with random faults and power side channelIn 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2018
- IPFADescrambling of embedded SRAM using a laser probeIn 2018 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), 2018
2017
- WPCA dynamic rule creation based anomaly detection method for identifying security breaches in log recordsWireless Personal Communications, 2017
- FDTCA practical fault attack on ARX-like ciphers with a case study on ChaCha20In 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2017
- ASP-DACAn FPGA-compatible PLL-based sensor against fault injection attackIn 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), 2017
- ISQEDAn electromagnetic fault injection sensor using Hogge phase-detectorIn 2017 18th International Symposium on Quality Electronic Design (ISQED), 2017
- JCENA study on analyzing side-channel resistant encoding schemes with respect to fault attacksJournal of Cryptographic Engineering, 2017
- CT-RSAFeeding two cats with one bowl: On designing a fault and side-channel resistant software encoding schemeIn Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings, 2017
- FDTCOne plus one is more than two: a practical combination of power and fault analysis attacks on PRESENT and PRESENT-like block ciphersIn 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2017
- HASSExtensive laser fault injection profiling of 65 nm FPGAJournal of Hardware and Systems Security, 2017
- HASSAttacks in reality: The limits of concurrent error detection codes against laser fault injectionJournal of Hardware and Systems Security, 2017
2016
- HOSTThe other side of the coin: Analyzing software encoding schemes against fault injection attacksIn 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2016
- FDTCRing oscillator under laser: potential of pll-based countermeasure against laser fault injectionIn 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016
- CPSSBypassing parity protected cryptography using laser fault injection in cyber-physical systemIn Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016
- ARESOn analyzing program behavior under fault injection attacksIn 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016
- ISICOn determining optimal parameters for testing devices against laser fault attacksIn 2016 International Symposium on Integrated Circuits (ISIC), 2016
- PROOFSMistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes’ Resistance to Fault Injection AttacksIn International Workshop on Security Proofs for Embedded Systems (PROOFS), 2016
- SPACECheap and cheerful: A low-cost digital sensor for detecting laser fault injection attacksIn International Conference on Security, Privacy, and Applied Cryptography Engineering, 2016
- SPACEComprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGAIn Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Dec 2016
2015
- CPSSLaser profiling for the back-side fault attacks: with a practical laser skip instruction attack on AESIn Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, Dec 2015
- WESSTesting feasibility of back-side laser fault injection on a microcontrollerIn Proceedings of the WESS’15: Workshop on Embedded Systems Security, Dec 2015
- ICISAAnomaly detection from log files using data mining techniquesIn Information Science and Applications, Dec 2015
- SIoTMultiple fault attack on present with a hardware trojan implementation in fpgaIn 2015 international workshop on secure internet of things (SIot), Dec 2015
- ICTDifferential fault attack on LEAIn Information and Communication Technology: Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings 3, Dec 2015
2014
- ISICOverview of machine learning based side-channel analysis methodsIn 2014 International Symposium on Integrated Circuits (ISIC), Dec 2014
- ICTAssets dependencies model in information security risk managementIn Information and Communication Technology: Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings 2, Dec 2014
- ISTSecurity evaluation model based on the score of security mechanismsInformation Sciences and Technologies, Dec 2014
- JISIS
- ISICA survey of the state-of-the-art fault attacksIn 2014 International Symposium on Integrated Circuits (ISIC), Dec 2014
- ARESQualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition PlatformIn 2014 Ninth International Conference on Availability, Reliability and Security, Dec 2014
2013
- ICTOn identifying proper security mechanismsIn Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings 1, Dec 2013
- ARESOn selecting critical security controlsIn 2013 International Conference on Availability, Reliability and Security, Dec 2013
2012
- ESTELNew approach in information system security evaluationIn 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL), Dec 2012
- JEEOn practical results of the differential power analysisJournal of Electrical Engineering, Dec 2012
- CompSysTechTowards a security evaluation model based on security metricsIn Proceedings of the 13th International Conference on Computer Systems and Technologies, Dec 2012
- IJITASecurity Mechanisms Role in Information Security EvaluationInternational Journal of Information Technology Applications, Dec 2012
2011
- CompSysTechRisk analysis supported by information security metricsIn Proceedings of the 12th International Conference on Computer Systems and Technologies, Dec 2011